More Related Content Similar to Webinar: CYREN WebSecurity for Healthcare (20) Webinar: CYREN WebSecurity for Healthcare1. 1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Achieving Effective Cyber Security for Healthcare
Chris Taylor, Sr. Director, Product and Marketing
2. 2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE
THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time
innovator of cyber intelligence solutions. CYREN provides web,
email, endpoint, and roaming cybersecurity solutions that are
relied upon by the world’s largest IT companies to protect them
and the billions of customers they serve from today’s advanced
threats.
2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
3. 3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence forms the security foundation of many of the world’s largest
and most influential information technology and Internet security brands.
4. 4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN by the Numbers
The Best Data
Delivers the Best
Protection
5. 5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5
The Changing Security
Landscape for Healthcare
6. 6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
New Technology Is Transforming Healthcare
Driven by the need for better patient outcomes and cost reduction
Philips HealthTech Trends, 2015
7. 7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
New Technology Is Transforming Healthcare
Driven by the need for better patient outcomes and cost reduction
Philips HealthTech Trends, 2015
8. 8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question #1
Which technologies have you implemented? (Select All that Apply)
1. Mobile (tablet/laptop/smartphone) devices for clinicians
2. Electronic Health/Medical Record (EHR/EMR) platform
3. Electronic Document Management
4. Moving data and/or applications to the Cloud
5. Wireless wearable patient monitors?
9. 9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
New Technology Creates Security Challenges
Scarcity of security resources
Additional use of local and personal devices
Hassle of basic security measures
Lagging security governance
10. 10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Healthcare Security Headlines
11. 11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
What the Analysts Say…
“The expanding number of access points to Protected Health Information (PHI) and other sensitive data
via electronic medical records and the growing popularity of wearable technology makes the healthcare
industry a vulnerable and attractive target for cybercriminals. Several factors suggest the healthcare
industry will continue to be plagued with data breach headlines in 2015.”
2015 Annual Data Breach Industry Forecast, Experian
“A series of recent high-profile security failures shows that many healthcare delivery organizations'
current practices and controls remain inadequate. Gartner's guidelines will help CIOs keep their
organizations safe to facilitate safe participation in digital business.
Healthcare Delivery Organizations Will Need Stronger Security to Participate in Digital Business, Gartner, 2015
“Small- to middle-market (healthcare) organizations are at greater risk for data breach, as they have
limited security and privacy processes, personnel, technology, and budgets compared to their enterprise
or large corporate counterparts.”
2015 Annual Benchmark Study on Privacy and Security of Healthcare Data, Ponemon Institute
12. 12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question #2
What Web security concerns do you have? (Select All that Apply)
1. Clinicians connecting to unsecured networks
2. Phishing attacks
3. Enforcing compliance policy on browsing
4. Maintaining patient data privacy (HIPAA)
5. Security for patient/visitor WiFi
13. 13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 13
Healthcare Threat Vectors
14. 14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing Continues to Grow in Popularity
Source: CYREN Cyber Threat Q1 Report, April 2015
15. 15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Android Is the Fastest-Growing Target for Malware
Source: CYREN Cyber Threat Q1 Report, April 2015
16. 16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question #3
What security technology do you use today? (Select All that Apply)
1. Firewall with Content Filtering
2. Unified Threat Management (UTM) appliance
3. Next Generation Firewall (NGFW) appliance
4. Secure Web Gateway (SWG) appliance
5. Cloud-based Web security
17. 17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Healthcare Security is Trapped in a Legacy Approach
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side
SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
PAC
File
SSL
SSL
This approach was defined for a 1990s computing model – centralized and static
18. 18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
TCO
We Need a Modern Solution to Modern Threats
Security Roaming
19. 19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
APPLICATION
Policy, Enforcement, Logging,
Alerting, Reporting
ANALYSIS
RPD, Heuristics, Signature, Sand box,
Human, etc.
THREAT DATA
17 BILLION transactions per day
ENDPOINTS
500 THOUSAND points of presence,
protecting 600 MILLION users
SECURITY
Applied
Cyber Intelligence
INSIGHT
Cyber Intelligence
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command
& Control
Actions
on Target
Helping Enterprises Disrupt
the Cyber Kill Chain
Applied Cyber Intelligence is the Answer
20. 20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
The fastest, best protection, from the brand the
security industry trusts
The Cyber Intelligence that protects 600+ Million
global users today
Cloud economics and ease of use combine for the
lowest Total Cost of Ownership
Your security scales with you, no matter how big or
complex your infrastructure becomes
A total security solution for office-based, remote,
roaming, and corporate IoT devices
Protection for users and for Public/Guest WiFi
networks
CYREN WebSecurity Is Applied Cyber Intelligence
21. 21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 21
Mobile App
Consumer Cloud
Private Cloud
Blocking Threats
Enforcing Compliance
Cloud App
Public Cloud
Analyzing Web Traffic
Applying Cyber Intelligence
Bot
Exploits APT
Malware
Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic
The Best Web Security for Healthcare
22. 22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Zero-Hour Phishing
Faster Detection Means Better Protection
Compliance / ProductivityZero-Hour Malware
“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster
than others, and providing unique detection of many attacks.”
Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance
Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity
23. 23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Malware Trends and Detection Speed
Malware Emails Malware URLs Zero-hour
Malware
detection
24. 24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
No capital expense for hardware or software
Eliminates the cost and complexity of multiple appliances
Up-to-the-moment applied cyber intelligence
Simple to deploy, easy to administer - centralized or distributed
Scales and moves with you
The Lowest Total Cost of Ownership (TCO)
Cloud-based Web Security as a Service drives down your cost
25. 25©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Simple deployment options
No backhaul for branch locations and remote workers
Policy enforcement and protection for up to 5 devices per user
Protect networks, notebooks, tablets and smartphones
Flexible controls for BYOD and corporate devices
No discernible impact compliant browsing experience
Secure Internet connectivity for IoT/wearables
Security and compliance public/guest WiFi networks
The Best Solution for Roaming and Remote
Designed for modern business computing
26. 26©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Healthcare technology use has transformed, creating gaps in security
Cyber criminals are systematically targeting these gaps
The legacy, hardware-driven approach to Web security is inadequate to close them
21st Century threats require a 21st Century solution with fast, accurate protection
CYREN WebSecurity is that solution
Summary
27. 27©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?
Chris Taylor
CYREN Marketing
+1 703.760.3320
Christopher.taylor@CYREN.com
Editor's Notes Key points for this slide:
CWS is based on a mass-scale cloud platform that protects hundreds of millions of users today.
It runs in our cloud.
It runs on our data.
It uses our detection technology.
This makes us unique in the industry. Nobody else has all that we have.
Many healthcare organizations fail to dedicate resources to provide adequate security for devices.
Many clinical IT systems have poor usability — especially for clinicians — so they often resort to putting personal health information on local devices simply to get their jobs done.
Clinicians find that security solutions require more passwords, with increased length and complexity, shorter timeout intervals and more frequent password change cycles. This results in a negative user experience and further motivation to try to circumvent security measures.
The left column shows the explosive growth in phishing URL volume for 2014 over 2013. As phishing is a popular delivery mechanism for attempted corporate breaches, this stat is important.
The right column shows that growth in the use of phishing has continued into Q1 of this year. This slide shows that Android still remains the cyber criminals primary mobile target. Google is working hard to convince smartphone buyers that Android is ‘safe’ as a platform, yet studies from various vendors continue to show that about 99% of ALL mobile malware is specifically designed to target Android. It’s not enough to have access to Cyber Intelligence any more. It needs to be applied to threats at the point of delivery to ensure the best protection for business users and their data.
CYREN builds a detailed understanding (cyber intelligence) of the state of Internet threats at this moment, based on the 17 billion transactions we process on behalf of over 600 Million users in 200 countries around the world. This cyber intelligence can then be applied to each element of an online transaction to ensure that users enjoy the highest possible protection.
This is a slide from our security yearbook. The purpose is to show that malware volumes continue to rise at an alarming rate.